top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Advances in Digital Forensics XVII : 17th IFIP WG 11.9 International Conference, Virtual Event, February 1–2, 2021, Revised Selected Papers / / edited by Gilbert Peterson, Sujeet Shenoi
Advances in Digital Forensics XVII : 17th IFIP WG 11.9 International Conference, Virtual Event, February 1–2, 2021, Revised Selected Papers / / edited by Gilbert Peterson, Sujeet Shenoi
Edizione [1st ed. 2021.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2021
Descrizione fisica 1 online resource (268 pages)
Disciplina 005.8
Collana IFIP Advances in Information and Communication Technology
Soggetto topico Data protection
Machine learning
Computer engineering
Computer networks
Computers - Law and legislation
Information technology - Law and legislation
Data and Information Security
Machine Learning
Computer Engineering and Networks
Computer Communication Networks
Legal Aspects of Computing
Medicina legal
Xifratge (Informàtica)
Seguretat informàtica
Programari d'aplicació
Cibercultura
Soggetto genere / forma Congressos
Llibres electrònics
ISBN 3-030-88381-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Contents -- Contributing Authors -- Preface -- I THEMES AND ISSUES -- Chapter 1 DIGITAL FORENSIC ACQUISITION KILL CHAIN - ANALYSIS AND DEMONSTRATION -- 1. Introduction -- 2. Related Work -- 3. Digital Forensic Acquisition Kill Chain -- 3.1 Background -- 3.2 Kill Chain Overview -- 3.3 Kill Chain Phases -- 4. Case-Motivated Kill Chain Example -- 5. Conclusions -- Acknowledgement -- References -- Chapter 2 ENHANCING INDUSTRIAL CONTROL SYSTEM FORENSICS USING REPLICATION-BASED DIGITAL TWINS -- 1. Introduction -- 2. Background -- 2.1 Digital Twin -- 2.2 Digital Twin Security -- 2.3 Digital Forensics -- 3. Related Work -- 4. Replication Using Digital Twins -- 4.1 Replication and Replay Theorems -- 4.2 Conceptual Framework -- 5. Implementation and Evaluation -- 5.1 Implementation and Experimental Setup -- 5.2 Results and Evaluation -- 6. Discussion -- 7. Conclusions -- Acknowledgement -- References -- Chapter 3 COMPARISON OF CYBER ATTACKS ON SERVICES IN THE CLEARNET AND DARKNET -- 1. Introduction -- 2. Background -- 3. Common Targets and Attacks -- 4. Related Work -- 5. Honeypot Deployment -- 5.1 Security Considerations -- 5.2 Deployment Process -- 6. Implementation Details -- 6.1 Virtual Machine Architectures -- 6.2 Honeypot Services -- 7. Experiments and Results -- 7.1 Service Deployments -- 7.2 Announcements -- 7.3 Observed Web Requests -- 7.4 Observed SSH and Telnet Access -- 7.5 Observed SMTP Requests -- 7.6 Observed FTP Requests -- 7.7 Discussion -- 8. Conclusions -- Acknowledgement -- References -- II APPROXIMATE MATCHING TECHNIQUES -- Chapter 4 USING PARALLEL DISTRIBUTED PROCESSING TO REDUCE THE COMPUTATIONAL TIME OF DIGITAL MEDIA SIMILARITY MEASURES -- 1. Introduction -- 2. Previous Work -- 3. Jaccard Indexes of Similarity -- 3.1 Jaccard Index -- 3.2 Jaccard Index with Normalized Frequency -- 4. Jaccard Index with Split Files.
5. Results and Validation -- 6. Conclusions -- References -- Chapter 5 EVALUATION OF NETWORK TRAFFIC ANALYSIS USING APPROXIMATE MATCHING ALGORITHMS -- 1. Introduction -- 2. Foundations and Related Work -- 2.1 Current State of Approximate Matching -- 2.2 Approximate Matching Algorithms -- 3. Controlled Study -- 3.1 All vs. All Evaluation -- 3.2 Evaluation Methodology -- 4. Experimental Results and Optimizations -- 5. Conclusions -- Acknowledgement -- References -- III ADVANCED FORENSIC TECHNIQUES -- Chapter 6 LEVERAGING USB POWER DELIVERY IMPLEMENTATIONS FOR DIGITAL FORENSIC ACQUISITION -- 1. Introduction -- 2. USB Power Delivery Protocol -- 3. Research Methodology -- 4. Results -- 4.1 Information Gathering -- 4.2 Passive Monitoring -- 4.3 Firmware Files -- 4.4 Firmware Reverse Engineering -- 4.5 Apple Vendor-Defined Protocol -- 4.6 Firmware Modification and Rollback -- 5. Conclusions -- Acknowledgements -- References -- Chapter 7 DETECTING MALICIOUS PDF DOCUMENTS USING SEMI-SUPERVISED MACHINE LEARNING -- 1. Introduction -- 2. Background and Related Work -- 2.1 PDF Document Structure -- 2.2 Document Entropy -- 2.3 Malicious PDF Document Detection -- 3. Malicious PDF Document Detection Method -- 3.1 Structural Features -- 3.2 Entropy-Based Statistical Features -- 3.3 Classification -- 4. Experiments and Results. -- 4.1 Dataset Creation and Experimental Setup -- 4.2 Evaluation Metrics -- 4.3 Feature Set Analysis -- 4.4 Classifier Analysis -- 4.5 Detection Method Comparison -- 5. Conclusions -- Acknowledgement -- References -- Chapter 8 MALICIOUS LOGIN DETECTION USING LONG SHORT-TERM MEMORY WITH AN ATTENTION MECHANISM -- 1. Introduction -- 2. Related Work -- 3. Preliminaries -- 3.1 Detection Method Overview -- 3.2 Threat Model -- 4. Proposed Method -- 4.1 Host Vector Learning -- 4.2 Feature Extraction -- 4.3 Attention Mechanism.
4.4 Classification Model Optimization -- 5. Experimental Evaluation -- 5.1 Dataset Description -- 5.2 Experimental Setup -- 5.3 Evaluated Models -- 5.4 Evaluation Results -- 5.5 Optimization and Learning Rate -- 6. Conclusions -- References -- IV NOVEL APPLICATIONS -- Chapter 9 PREDICTING THE LOCATIONS OF UNREST USING SOCIAL MEDIA -- 1. Introduction -- 2. Related Work -- 3. Location Extraction from Web Forum Data -- 3.1 Web Forum Dataset -- 3.2 Dictionary-Based Semi-Supervised Learning -- 3.3 BiLSTM-CRF Model -- 3.4 n-Gram-ARM Algorithm -- 4. Experiments and Results -- 5. Conclusions -- References -- Chapter 10 EXTRACTING THREAT INTELLIGENCE RELATIONS USING DISTANT SUPERVISION AND NEURAL NETWORKS -- 1. Introduction -- 2. Related Work -- 2.1 Threat Intelligence Datasets -- 2.2 Threat Intelligence Information Extraction -- 3. Proposed Framework -- 3.1 Overview -- 3.2 Problem Specification -- 3.3 Dataset -- 3.4 Neural Network Model -- 4. Experiments and Results -- 4.1 Experiment Details -- 4.2 Comparison with Baseline Models -- 4.3 Extraction Results -- 5. Conclusions -- Acknowledgement -- References -- Chapter 11 SECURITY AUDITING OF INTERNET OF THINGS DEVICES IN A SMART HOME -- 1. Introduction -- 2. Preliminaries -- 2.1 Security Standards and Best Practices -- 2.2 Security Auditing Challenges -- 2.3 Threat Model -- 3. Security Auditing Methodology -- 3.1 Step 1: Build a Knowledge Base -- 3.2 Step 2: Translate to Security Rules -- 3.3 Step 3: Audit IoT Device Security -- 4. Auditing Smart Home Security -- 4.1 Security Rule Definition -- 4.2 Data Collection -- 4.3 Formal Language Translation -- 4.4 Verification -- 4.5 Evidence Extraction -- 5. Security Auditing Framework -- 6. Experiments and Results -- 6.1 Experimental Setup -- 6.2 Experimental Results -- 7. Discussion -- 8. Related Work -- 9. Conclusions -- References -- V IMAGE FORENSICS.
Chapter 12 INDIAN CURRENCY DATABASE FOR FORENSIC RESEARCH -- 1. Introduction -- 2. Related Work -- 3. Indian Currency Security Features -- 4. Indian Currency Database -- 4.1 Sample Collection -- 4.2 Security Feature Identification -- 4.3 Database Creation -- 5. Conclusions -- References -- Chapter 13 SECURITY AND PRIVACY ISSUES RELATED TO QUICK RESPONSE CODES -- 1. Introduction -- 2. QR Code Structure -- 3. QR Code Evolution -- 4. Key Issues -- 4.1 Authentication with QR Codes -- 4.2 Attacks Using QR Codes -- 4.3 Security and Privacy of QR Codes -- 5. Innovative Applications -- 5.1 Self-Authenticating Documents -- 5.2 Color QR Codes -- 5.3 Anti-Counterfeiting QR Codes -- 6. Conclusions -- References.
Record Nr. UNINA-9910502594403321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2021
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advances in Digital Forensics XVII : 17th IFIP WG 11.9 International Conference, Virtual Event, February 1–2, 2021, Revised Selected Papers / / edited by Gilbert Peterson, Sujeet Shenoi
Advances in Digital Forensics XVII : 17th IFIP WG 11.9 International Conference, Virtual Event, February 1–2, 2021, Revised Selected Papers / / edited by Gilbert Peterson, Sujeet Shenoi
Edizione [1st ed. 2021.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2021
Descrizione fisica 1 online resource (268 pages)
Disciplina 005.8
Collana IFIP Advances in Information and Communication Technology
Soggetto topico Data protection
Machine learning
Computer engineering
Computer networks
Computers - Law and legislation
Information technology - Law and legislation
Data and Information Security
Machine Learning
Computer Engineering and Networks
Computer Communication Networks
Legal Aspects of Computing
Medicina legal
Xifratge (Informàtica)
Seguretat informàtica
Programari d'aplicació
Cibercultura
Soggetto genere / forma Congressos
Llibres electrònics
ISBN 3-030-88381-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Contents -- Contributing Authors -- Preface -- I THEMES AND ISSUES -- Chapter 1 DIGITAL FORENSIC ACQUISITION KILL CHAIN - ANALYSIS AND DEMONSTRATION -- 1. Introduction -- 2. Related Work -- 3. Digital Forensic Acquisition Kill Chain -- 3.1 Background -- 3.2 Kill Chain Overview -- 3.3 Kill Chain Phases -- 4. Case-Motivated Kill Chain Example -- 5. Conclusions -- Acknowledgement -- References -- Chapter 2 ENHANCING INDUSTRIAL CONTROL SYSTEM FORENSICS USING REPLICATION-BASED DIGITAL TWINS -- 1. Introduction -- 2. Background -- 2.1 Digital Twin -- 2.2 Digital Twin Security -- 2.3 Digital Forensics -- 3. Related Work -- 4. Replication Using Digital Twins -- 4.1 Replication and Replay Theorems -- 4.2 Conceptual Framework -- 5. Implementation and Evaluation -- 5.1 Implementation and Experimental Setup -- 5.2 Results and Evaluation -- 6. Discussion -- 7. Conclusions -- Acknowledgement -- References -- Chapter 3 COMPARISON OF CYBER ATTACKS ON SERVICES IN THE CLEARNET AND DARKNET -- 1. Introduction -- 2. Background -- 3. Common Targets and Attacks -- 4. Related Work -- 5. Honeypot Deployment -- 5.1 Security Considerations -- 5.2 Deployment Process -- 6. Implementation Details -- 6.1 Virtual Machine Architectures -- 6.2 Honeypot Services -- 7. Experiments and Results -- 7.1 Service Deployments -- 7.2 Announcements -- 7.3 Observed Web Requests -- 7.4 Observed SSH and Telnet Access -- 7.5 Observed SMTP Requests -- 7.6 Observed FTP Requests -- 7.7 Discussion -- 8. Conclusions -- Acknowledgement -- References -- II APPROXIMATE MATCHING TECHNIQUES -- Chapter 4 USING PARALLEL DISTRIBUTED PROCESSING TO REDUCE THE COMPUTATIONAL TIME OF DIGITAL MEDIA SIMILARITY MEASURES -- 1. Introduction -- 2. Previous Work -- 3. Jaccard Indexes of Similarity -- 3.1 Jaccard Index -- 3.2 Jaccard Index with Normalized Frequency -- 4. Jaccard Index with Split Files.
5. Results and Validation -- 6. Conclusions -- References -- Chapter 5 EVALUATION OF NETWORK TRAFFIC ANALYSIS USING APPROXIMATE MATCHING ALGORITHMS -- 1. Introduction -- 2. Foundations and Related Work -- 2.1 Current State of Approximate Matching -- 2.2 Approximate Matching Algorithms -- 3. Controlled Study -- 3.1 All vs. All Evaluation -- 3.2 Evaluation Methodology -- 4. Experimental Results and Optimizations -- 5. Conclusions -- Acknowledgement -- References -- III ADVANCED FORENSIC TECHNIQUES -- Chapter 6 LEVERAGING USB POWER DELIVERY IMPLEMENTATIONS FOR DIGITAL FORENSIC ACQUISITION -- 1. Introduction -- 2. USB Power Delivery Protocol -- 3. Research Methodology -- 4. Results -- 4.1 Information Gathering -- 4.2 Passive Monitoring -- 4.3 Firmware Files -- 4.4 Firmware Reverse Engineering -- 4.5 Apple Vendor-Defined Protocol -- 4.6 Firmware Modification and Rollback -- 5. Conclusions -- Acknowledgements -- References -- Chapter 7 DETECTING MALICIOUS PDF DOCUMENTS USING SEMI-SUPERVISED MACHINE LEARNING -- 1. Introduction -- 2. Background and Related Work -- 2.1 PDF Document Structure -- 2.2 Document Entropy -- 2.3 Malicious PDF Document Detection -- 3. Malicious PDF Document Detection Method -- 3.1 Structural Features -- 3.2 Entropy-Based Statistical Features -- 3.3 Classification -- 4. Experiments and Results. -- 4.1 Dataset Creation and Experimental Setup -- 4.2 Evaluation Metrics -- 4.3 Feature Set Analysis -- 4.4 Classifier Analysis -- 4.5 Detection Method Comparison -- 5. Conclusions -- Acknowledgement -- References -- Chapter 8 MALICIOUS LOGIN DETECTION USING LONG SHORT-TERM MEMORY WITH AN ATTENTION MECHANISM -- 1. Introduction -- 2. Related Work -- 3. Preliminaries -- 3.1 Detection Method Overview -- 3.2 Threat Model -- 4. Proposed Method -- 4.1 Host Vector Learning -- 4.2 Feature Extraction -- 4.3 Attention Mechanism.
4.4 Classification Model Optimization -- 5. Experimental Evaluation -- 5.1 Dataset Description -- 5.2 Experimental Setup -- 5.3 Evaluated Models -- 5.4 Evaluation Results -- 5.5 Optimization and Learning Rate -- 6. Conclusions -- References -- IV NOVEL APPLICATIONS -- Chapter 9 PREDICTING THE LOCATIONS OF UNREST USING SOCIAL MEDIA -- 1. Introduction -- 2. Related Work -- 3. Location Extraction from Web Forum Data -- 3.1 Web Forum Dataset -- 3.2 Dictionary-Based Semi-Supervised Learning -- 3.3 BiLSTM-CRF Model -- 3.4 n-Gram-ARM Algorithm -- 4. Experiments and Results -- 5. Conclusions -- References -- Chapter 10 EXTRACTING THREAT INTELLIGENCE RELATIONS USING DISTANT SUPERVISION AND NEURAL NETWORKS -- 1. Introduction -- 2. Related Work -- 2.1 Threat Intelligence Datasets -- 2.2 Threat Intelligence Information Extraction -- 3. Proposed Framework -- 3.1 Overview -- 3.2 Problem Specification -- 3.3 Dataset -- 3.4 Neural Network Model -- 4. Experiments and Results -- 4.1 Experiment Details -- 4.2 Comparison with Baseline Models -- 4.3 Extraction Results -- 5. Conclusions -- Acknowledgement -- References -- Chapter 11 SECURITY AUDITING OF INTERNET OF THINGS DEVICES IN A SMART HOME -- 1. Introduction -- 2. Preliminaries -- 2.1 Security Standards and Best Practices -- 2.2 Security Auditing Challenges -- 2.3 Threat Model -- 3. Security Auditing Methodology -- 3.1 Step 1: Build a Knowledge Base -- 3.2 Step 2: Translate to Security Rules -- 3.3 Step 3: Audit IoT Device Security -- 4. Auditing Smart Home Security -- 4.1 Security Rule Definition -- 4.2 Data Collection -- 4.3 Formal Language Translation -- 4.4 Verification -- 4.5 Evidence Extraction -- 5. Security Auditing Framework -- 6. Experiments and Results -- 6.1 Experimental Setup -- 6.2 Experimental Results -- 7. Discussion -- 8. Related Work -- 9. Conclusions -- References -- V IMAGE FORENSICS.
Chapter 12 INDIAN CURRENCY DATABASE FOR FORENSIC RESEARCH -- 1. Introduction -- 2. Related Work -- 3. Indian Currency Security Features -- 4. Indian Currency Database -- 4.1 Sample Collection -- 4.2 Security Feature Identification -- 4.3 Database Creation -- 5. Conclusions -- References -- Chapter 13 SECURITY AND PRIVACY ISSUES RELATED TO QUICK RESPONSE CODES -- 1. Introduction -- 2. QR Code Structure -- 3. QR Code Evolution -- 4. Key Issues -- 4.1 Authentication with QR Codes -- 4.2 Attacks Using QR Codes -- 4.3 Security and Privacy of QR Codes -- 5. Innovative Applications -- 5.1 Self-Authenticating Documents -- 5.2 Color QR Codes -- 5.3 Anti-Counterfeiting QR Codes -- 6. Conclusions -- References.
Record Nr. UNISA-996464525303316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2021
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Application of Big Data, Blockchain, and Internet of Things for Education Informatization : Second EAI International Conference, BigIoT-EDU 2022, Virtual Event, July 29–31, 2022, Proceedings, Part I / / edited by Mian Ahmad Jan, Fazlullah Khan
Application of Big Data, Blockchain, and Internet of Things for Education Informatization : Second EAI International Conference, BigIoT-EDU 2022, Virtual Event, July 29–31, 2022, Proceedings, Part I / / edited by Mian Ahmad Jan, Fazlullah Khan
Autore Jan Mian Ahmad
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023
Descrizione fisica 1 online resource (666 pages)
Disciplina 005.3
Altri autori (Persone) KhanFazlullah
Collana Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
Soggetto topico Application software
Artificial intelligence
Computer networks
Computer and Information Systems Applications
Artificial Intelligence
Computer Communication Networks
Programari d'aplicació
Processament de dades
Intel·ligència artificial
Educació
Soggetto genere / forma Congressos
Llibres electrònics
ISBN 3-031-23950-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto A study of College English writing from the perspective of deep learning -- Design and implementation of English teaching analysis system based on Data Mining -- Research on the Design of Modern Music Creation System under Data Technology -- A study on the scoring method of oral English test in College English online computer test -- Design and implementation of key modules of English teaching system based on J2EE -- An analysis of hotel management business strategy research under the background of tourism boom under the correlation algorithm -- An Industrial Software Model Checking Method Based on Machine Learning and Its Application in Education -- Design and implementation of learning management system based on user behavior dynamic recommendation algorithm -- Design and implementation of oral training system based on automatic speech evaluation -- Design and implementation of student physical fitness analysis system based on Data Mining Technology -- An intelligent piano teaching system and method based on a cloud platform -- Analysis and prediction of CET4 based on Data Mining -- Analysis of the rational use of context construction in College English teaching based on Association Rules Mining Algorithm -- Application and Implementation of Education Management System Based on Cloud Storage -- Application of big data in comprehensive management and service of sports training system under the background of informatization -- Application of Big Data Informatization in Public Utilities Response -- Application of classification mining technology based on decision tree in Student Resource Management -- Application of computer intelligent proofreading system in English phrase translation -- Application of data analysis technology in Physical Education Teaching -- Design and implementation of teaching evaluation system in Higher Vocational Colleges Based on association rule algorithm -- Application of data mining algorithm in value engineering in the selection of highway engineering design scheme -- Application of Network Curriculum Platform based on Cloud Computing in Physical Education Teaching -- Application of data mining in psychological education of college students in private independent colleges -- Application of quaternion instructional design mode in higher education based on personalized algorithm -- Application of data mining technology based on Weka in student management -- Application of decision tree algorithm in teaching quality analysis of Physical Education -- Application of environmental isotopes to study the origin and recharge mechanism of geothermal water -- Application of flipped classroom teaching mode based on Ant Colony Algorithm in Higher Vocational java course -- Application of fuzzy c-means clustering algorithm in consumer psychology -- Application of game equilibrium theory and algorithm in modern talent training model -- Application of ID3 algorithm in college students' mental health education -- Application of random simulation algorithm in practical teaching of Public Physical Education in Colleges and Universities -- Application of Intelligent Fuzzy Decision Tree algorithm in English Translation Education -- Application of intelligent water conservancy information system in agricultural water-saving irrigation -- Application of Machine Learning algorithm in Marketing Education -- Design and implementation of dynamic grouping algorithm based on sports track -- Application of montage thinking in computer sketch painting -- Application of network course platform based on cloud computing in Physical Education -- Design and development of CAI Courseware for basketball teaching of Physical Education Specialty -- Deep Learning in the Context of Big Data: The Theoretical Basis of Undergraduate Education Reform -- Decision support system model of education management based on cloud storage technology -- Data mining analysis based on business administration data -- Application of stochastic simulation algorithm in evaluation of PE training -- Course recommendation method and system of education platform based on deep learning -- Design and research of College Students' comprehensive quality evaluation system based on evolutionary algorithm -- Design of business administration professional shared whiteboard teaching system based on BS data mining architecture -- Design of Education Management System Based on Cloud Storage -- Design of information teaching management system integrating Association Rule Mining Algorithm -- On the influence of computer digital animation technology on film style -- Discourse analysis of Chinese culture translation based on crawler algorithm -- Optimization models and educational teaching research in Agricultural Logistics System -- Practical Research on the Form of Art Undergraduate Education in Cultural and Creative Industry under the Background of Big Data -- Prediction of English major training model in Higher Vocational Education Based on fuzzy neural network algorithm -- Professional course system of film and television photography and production under data technology -- Quality evaluation model of preschool art education based on deep learning theory -- Education targeted poverty alleviation system under cloud computing -- Research and construction of university sports decision support system based on extraction algorithm and big data analysis technology -- Research and design of education management system based on cloud storage -- Research and Design of Information Teaching Management System integrating association rule mining algorithm -- Research Design of English Teaching Resource Management System Based on Collaborative Recommendation -- Research on art design education based on genetic algorithm -- Research on channel optimization strategy based on Data Mining Technology.-Research on College Chinese online learning system based on content recommendation algorithm -- Research on College Students' English Online Autonomous Learning Based on ID3 algorithm -- Research on computer aided English curriculum design in Higher Vocational Colleges -- Research on computer network information security protection strategy and evaluation algorithm education -- Research on Computer Software Teaching Method of Digital Media Art Theory under the Background of Big Data -- Research on Design of English teaching resource management system based on Collaborative Recommendation.
Record Nr. UNINA-9910644266403321
Jan Mian Ahmad  
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Artificial Neural Networks and Machine Learning – ICANN 2022 : 31st International Conference on Artificial Neural Networks, Bristol, UK, September 6–9, 2022, Proceedings, Part I / / edited by Elias Pimenidis, Plamen Angelov, Chrisina Jayne, Antonios Papaleonidas, Mehmet Aydin
Artificial Neural Networks and Machine Learning – ICANN 2022 : 31st International Conference on Artificial Neural Networks, Bristol, UK, September 6–9, 2022, Proceedings, Part I / / edited by Elias Pimenidis, Plamen Angelov, Chrisina Jayne, Antonios Papaleonidas, Mehmet Aydin
Edizione [1st ed. 2022.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2022
Descrizione fisica 1 online resource (783 pages)
Disciplina 006.3
Collana Lecture Notes in Computer Science
Soggetto topico Artificial intelligence
Application software
Computers
Computer engineering
Computer networks
Artificial Intelligence
Computer and Information Systems Applications
Computing Milieux
Computer Engineering and Networks
Intel·ligència artificial
Xarxes d'ordinadors
Programari d'aplicació
Aprenentatge automàtic
Soggetto genere / forma Llibres electrònics
Congressos
ISBN 9783031159190
3031159195
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Deep Learning -- , Neural Network Theory -- Relational Learning, Reinforcement Learning -- Natural language processing, Generative Models -- Graphical Models, Recommender Systems -- Image Processing, Recurrent Networks -- Evolutionary Neural Networks -- Unsupervised Neural Networks -- Neural Network Models.
Record Nr. UNINA-9910592979303321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2022
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Computer Safety, Reliability, and Security. SAFECOMP 2022 Workshops : DECSoS, DepDevOps, SASSUR, SENSEI, USDAI, and WAISE Munich, Germany, September 6–9, 2022, Proceedings / / edited by Mario Trapp, Erwin Schoitsch, Jérémie Guiochet, Friedemann Bitsch
Computer Safety, Reliability, and Security. SAFECOMP 2022 Workshops : DECSoS, DepDevOps, SASSUR, SENSEI, USDAI, and WAISE Munich, Germany, September 6–9, 2022, Proceedings / / edited by Mario Trapp, Erwin Schoitsch, Jérémie Guiochet, Friedemann Bitsch
Edizione [1st ed. 2022.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2022
Descrizione fisica 1 online resource (360 pages)
Disciplina 005.3
Collana Lecture Notes in Computer Science
Soggetto topico Computer engineering
Computer networks
Image processing—Digital techniques
Computer vision
Application software
Software engineering
Computer science
Data protection
Computer Engineering and Networks
Computer Imaging, Vision, Pattern Recognition and Graphics
Computer and Information Systems Applications
Software Engineering
Theory of Computation
Security Services
Seguretat informàtica
Organització d'ordinadors
Enginyeria de programari
Llenguatges de programació
Lògica informàtica
Programari d'aplicació
Soggetto genere / forma Congressos
Llibres electrònics
ISBN 9783031148620
3031148622
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Dependable Smart Embedded Cyber-Physical Systems and Systems-of-Systems -- Dependable Development-Operation Continuum Methods for Dependable Cyber-Physical System -- Next Generation of System Assurance Approaches for Critical Systems -- Security and Safety Interaction -- Underpinnings for Safe Distributed Artificial Intelligence -- Artificial Intelligence Safety Engineering.
Record Nr. UNINA-9910592980603321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2022
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Computer vision and machine learning in agriculture / / Mohammad Shorif Uddin and Jagdish Chand Bansal, Editors
Computer vision and machine learning in agriculture / / Mohammad Shorif Uddin and Jagdish Chand Bansal, Editors
Pubbl/distr/stampa Gateway East, Singapore : , : Springer, , [2021]
Descrizione fisica 1 online resource (180 pages) : illustrations
Disciplina 630.2085
Collana Algorithms for Intelligent Systems
Soggetto topico Computational intelligence
Robotics
Machine learning
Visió per ordinador
Aprenentatge automàtic
Programari d'aplicació
Agricultura
Soggetto genere / forma Llibres electrònics
ISBN 981-336-424-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910484429803321
Gateway East, Singapore : , : Springer, , [2021]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Digital Multimedia Communications : 20th International Forum on Digital TV and Wireless Multimedia Communications, IFTC 2023, Beijing, China, December 21–22, 2023, Revised Selected Papers, Part II / / edited by Guangtao Zhai, Jun Zhou, Long Ye, Hua Yang, Ping An, Xiaokang Yang
Digital Multimedia Communications : 20th International Forum on Digital TV and Wireless Multimedia Communications, IFTC 2023, Beijing, China, December 21–22, 2023, Revised Selected Papers, Part II / / edited by Guangtao Zhai, Jun Zhou, Long Ye, Hua Yang, Ping An, Xiaokang Yang
Autore Zhai Guangtao
Edizione [1st ed. 2024.]
Pubbl/distr/stampa Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2024
Descrizione fisica 1 online resource (413 pages)
Disciplina 006.7
Altri autori (Persone) ZhouJun
YeLong
YangHua
AnPing
YangXiaokang
Collana Communications in Computer and Information Science
Soggetto topico Multimedia systems
Application software
Artificial intelligence
Image processing - Digital techniques
Computer vision
Multimedia Information Systems
Computer and Information Systems Applications
Artificial Intelligence
Computer Imaging, Vision, Pattern Recognition and Graphics
Sistemes multimèdia
Programari d'aplicació
Intel·ligència artificial
Processament d'imatges
Soggetto genere / forma Llibres electrònics
ISBN 981-9736-26-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto -- Quality Assessment. -- AUIQE: Attention-Based Underwater Image Quality Evaluator. -- I2QED: A Benchmark Database for Infrared Imaging Quality Evaluation. -- Perceptual Blind Panoramic Image Quality Assessment Based on Super-Pixel. -- Image Aesthetics Assessment Based on Visual Perception and Textual Semantic Understanding. -- An Omnidirectional Videos Quality Assessment Method Using Salient Object Information. -- A No-Reference Stereoscopic Image Quality Assessment Based on Cartoon Texture Decomposition and Human Visual System. -- Decoding the Flow Experience in Video Games: An Analysis of Physiological and Performance Metrics. -- Source Coding. -- ULIC: Ultra Lightweight Image Coder on Wearable Devices. -- Temporal Dependency-Oriented Deep In-Loop Filter for VVC. -- Resolution-Agnostic Neural Compression for High-Fidelity Portrait Video Conferencing via Implicit Radiance Fields. -- Fast QTMT Decision for H.266/VVC via Jointly Leveraging Neural Network and Machine Learning Models. -- End-to-End Image Compression Through Machine Semantics. -- Application of AI. -- PM2.5 Concentration Measurement Based on Natural Scene Statistics and Progressive Learning. -- Human-Centered Financial Signal Processing: A Case Study on Stock Chart Analysis. -- Unsupervised Event-to-Image Reconstruction Based on Domain Adaptation. -- Adjusting Exploitation and Exploration Rates of Differential Evolution: A Novel Mutation Strategy. -- Revealing Real Face for Generalized Anti-Spoofing. -- Study on Sound Insulation Performance of Membrane-Type Acoustic Metamaterials with Pendulum Arm. -- An Anomaly Detection Framework for Propagation Networks Leveraging Deep Learning. -- MABC-Net: Multimodal Mixed Attentional Network with Balanced Class for Temporal Forgery Localization. -- Exploiting Diffusion Model as Prompt Generator for Object Localization. -- Depression Recognition Based on Pre-Trained ResNet-18 Model and Brain Effective Connectivity Network. -- ChatASD: LLM-Based AI Therapist for ASD. -- Billiards Hitting Assistance System. -- Visual Detection System for Industrial Defects. -- A Multimodal Registration and Fusion Diagnostic System Based on Multi-Scale Feature. -- CCDaS: A Benchmark Dataset for Cartoon Character Detection in Application Scenarios. -- Driving Dynamics: An In-depth Analysis of Attention Allocation Between Driver and Co-Driver in a Simulated Environment.
Record Nr. UNINA-9910866587303321
Zhai Guangtao  
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2024
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Domain-Specific Conceptual Modeling : Concepts, Methods and ADOxx Tools / / edited by Dimitris Karagiannis, Moonkun Lee, Knut Hinkelmann, Wilfrid Utz
Domain-Specific Conceptual Modeling : Concepts, Methods and ADOxx Tools / / edited by Dimitris Karagiannis, Moonkun Lee, Knut Hinkelmann, Wilfrid Utz
Edizione [1st ed. 2022.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2022
Descrizione fisica 1 online resource (643 pages)
Disciplina 003.54
005.743
Soggetto topico Application software
Software engineering
Business information services
Computer and Information Systems Applications
Software Engineering
Enterprise Architecture
Business Information Systems
Simulació per ordinador
Models matemàtics
Programari d'aplicació
Soggetto genere / forma Llibres electrònics
ISBN 3-030-93547-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Part I: Background -- 1. Conceptual Modelling Methods: The AMME Agile Engineering Approach -- 2. Development of Conceptual Models and Realization of Modelling Tools Within the ADOxx Meta-Modelling Environment: A Living Paper -- 3. Challenging Digital Innovation Through the OMiLAB Community of Practice -- Part II: Previous Volume: Synopsis -- 4. The Purpose-Specificity Framework for Domain-Specific Conceptual Modeling -- Part III: Enterprise Management -- 5. Enterprise Modeling with 4EM: Perspectives and Method -- 6. PGA 2.0: A Modeling Technique for the Alignment of the Organizational Strategy and Processes -- 7. The LiteStrat Modelling Method: Towards the Alignment of Strategy and Code -- 8. itsVALUE: Modelling and Analysing Value Streams for IT Services -- Part IV: Enterprise Information Systems -- 9. Enterprise Construction Modeling Method -- 10. Tool Support for Fractal Enterprise Modeling -- 11. The Integration of Risk Aspects into Business Process Management: The e-BPRIM Modeling Method -- 12. Modeling the Phenomenon of Capability Change: The KYKLOS Method -- 13. A Security Assessment Platform for Stochastic Petri Net (SPN) Modelling in the Internet of Things (IoT) Ecosystem -- Part V: Business Ecosystems and Services -- 14. A Modeling Tool for Exploring Business Ecosystems in a (Pre-)conceptual Phase -- 15. A Capability-Based Method for Modeling Resilient Data Ecosystems -- 16. Space of Services Method (SoS) -- 17. Design and Engineering of Product-Service Systems (PSS): The SEEM Methodology and Modeling Toolkit -- Part VI: Knowledge Engineering -- 18. Model-Based Guide Toward Digitization in Digital Business Ecosystems -- 19. Generating ROS Codes from User-Level Workflow in PRINTEPS -- 20. ECAVI: An Assistant for Reasoning About Actions and Change with the Event Calculus -- Part VII: Technology Enhanced Education -- 21. Tree Diagrams and Unit Squares 4.0: Digitizing Stochastic Classes with the Didactic Modeling Tool PROVIS -- 22. Improving Student Mobility Through Automated Mapping of Similar Courses -- Part VIII: Digital Humanities -- 23. Aggregation and Curation of Historical Archive Information -- Part IX: Modelling Method Conceptualization -- 24. Conceptualization of Modelling Methods in the Context of Categorical Mechanisms -- 25. Conceptualizing Design Thinking Artefacts: The Scene2Model Storyboard Approach -- 26. An Approach to the Information System Conceptual Modeling Based on the Form Types -- Part X: Conceptual Modelling Language Extension -- 27. BPMN4MoPla: Mobility Planning Based on Business Decision-Making -- 28. BPMN Extension for Multi-Protocol Data Orchestration.
Record Nr. UNINA-9910552715903321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2022
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Excel 2019 for physical sciences statistics : a guide to solving practical problems / / Thomas J. Quirk, Meghan H. Quirk, Howard F. Horton
Excel 2019 for physical sciences statistics : a guide to solving practical problems / / Thomas J. Quirk, Meghan H. Quirk, Howard F. Horton
Autore Quirk Thomas J.
Edizione [2nd ed. 2021.]
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2021]
Descrizione fisica 1 online resource (XIX, 242 p. 166 illus., 161 illus. in color.)
Disciplina 519.5
Collana Excel for Statistics
Soggetto topico Statistics
Mathematical physics
Application software
Estadística
Física matemàtica
Programari d'aplicació
Soggetto genere / forma Llibres electrònics
ISBN 3-030-63238-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Preface -- Acknowledgements -- 1 Sample Size, Mean, Standard Deviation, and Standard Error of the Mean -- 2 Random Number Generator -- 3 Confidence Interval About the Mean Using the TINV Function and Hypothesis Testing -- 4 One-Group t-Test for the Mean -- 5 Two-Group t-Test of the Difference of the Means for Independent Groups -- 6 Correlation and Simple Linear Regression -- 7 Multiple Correlation and Multiple Regression -- 8 One-Way Analysis of Variance (ANOVA) -- Appendix A: Answers to End-of-Chapter Practice Problems -- Appendix B: Practice Test -- Appendix C: Answers to Practice Test -- Appendix D: Statistical Formulas -- Appendix E: t-table -- Index.
Record Nr. UNISA-996466556103316
Quirk Thomas J.  
Cham, Switzerland : , : Springer, , [2021]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Excel 2019 for physical sciences statistics : a guide to solving practical problems / / Thomas J. Quirk, Meghan H. Quirk, Howard F. Horton
Excel 2019 for physical sciences statistics : a guide to solving practical problems / / Thomas J. Quirk, Meghan H. Quirk, Howard F. Horton
Autore Quirk Thomas J.
Edizione [2nd ed. 2021.]
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2021]
Descrizione fisica 1 online resource (XIX, 242 p. 166 illus., 161 illus. in color.)
Disciplina 519.5
Collana Excel for Statistics
Soggetto topico Statistics
Mathematical physics
Application software
Estadística
Física matemàtica
Programari d'aplicació
Soggetto genere / forma Llibres electrònics
ISBN 3-030-63238-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Preface -- Acknowledgements -- 1 Sample Size, Mean, Standard Deviation, and Standard Error of the Mean -- 2 Random Number Generator -- 3 Confidence Interval About the Mean Using the TINV Function and Hypothesis Testing -- 4 One-Group t-Test for the Mean -- 5 Two-Group t-Test of the Difference of the Means for Independent Groups -- 6 Correlation and Simple Linear Regression -- 7 Multiple Correlation and Multiple Regression -- 8 One-Way Analysis of Variance (ANOVA) -- Appendix A: Answers to End-of-Chapter Practice Problems -- Appendix B: Practice Test -- Appendix C: Answers to Practice Test -- Appendix D: Statistical Formulas -- Appendix E: t-table -- Index.
Record Nr. UNINA-9910484355603321
Quirk Thomas J.  
Cham, Switzerland : , : Springer, , [2021]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui